Secret sharing approach for securing cloud-based pre-classification volume ray-casting

With the evolution in cloud computing, cloud-based volume rendering, which outsources data rendering tasks to cloud datacenters, is attracting interest. Although this new rendering technique has many advantages, allowing third-party access to potentially sensitive volume data raises security and privacy concerns. In this paper, we address these concerns for cloud-based pre-classification volume ray-casting by using Shamir’s (k, n) secret sharing and its variant (l, k, n) ramp secret sharing, which are homomorphic to addition and scalar multiplication operations, to hide color information of volume data/images in datacenters. To address the incompatibility issue of the modular prime operation used in secret sharing technique with the floating point operations of ray-casting, we consider excluding modular prime operation from secret sharing or converting the floating number operations of ray-casting to fixed point operations – the earlier technique degrades security and the later degrades image quality. Both these techniques, however, result in significant data overhead. To lessen the overhead at the cost of high security, we propose a modified ramp secret sharing scheme that uses the three color components in one secret sharing polynomial and replaces the shares in floating point with smaller integers.

[1]  James A. Thom,et al.  Cloud Computing Security: From Single to Multi-clouds , 2012, 2012 45th Hawaii International Conference on System Sciences.

[2]  Denis Vazhenin,et al.  Cloud-based web-service for health 2.0 , 2012, HCCE '12.

[3]  Marten van Sinderen,et al.  Cloud Computing and Services Science , 2014, Service Science: Research and Innovations in the Service Economy.

[4]  Dimitrios Zissis,et al.  Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..

[5]  Eyal Kushilevitz,et al.  Secret sharing over infinite domains , 1993, Journal of Cryptology.

[6]  Pradeep K. Atrey,et al.  Secure Cloud-Based Volume Ray-Casting , 2013, 2013 IEEE 5th International Conference on Cloud Computing Technology and Science.

[7]  Ying Luo,et al.  Privacy protected image denoising with secret shares , 2012, 2012 19th IEEE International Conference on Image Processing.

[8]  Lein Harn,et al.  Authenticated Group Key Transfer Protocol Based on Secret Sharing , 2010, IEEE Transactions on Computers.

[9]  Octavian Catrina,et al.  Secure Computation with Fixed-Point Numbers , 2010, Financial Cryptography.

[10]  Pradeep K. Atrey,et al.  Homomorphic Low Pass Filtering on Encrypted Multimedia over Cloud , 2013, 2013 IEEE Seventh International Conference on Semantic Computing.

[11]  Marc Levoy,et al.  Display of surfaces from volume data , 1988, IEEE Computer Graphics and Applications.

[12]  J. Seberry,et al.  Secret sharing schemes arising from latin squares , 1994 .

[13]  Tim Mather,et al.  Cloud Security and Privacy - An Enterprise Perspective on Risks and Compliance , 2009, Theory in practice.

[14]  Josh Benaloh,et al.  Secret Sharing Homomorphisms: Keeping Shares of A Secret Sharing , 1986, CRYPTO.

[15]  Kevin J. Henry The Theory and Applications of Homomorphic Cryptography , 2008 .

[16]  Matthias J. Müller,et al.  Color-coded diffusion-tensor-imaging of posterior cingulate fiber tracts in mild cognitive impairment , 2005, Neurobiology of Aging.

[17]  Vinod Vaikuntanathan,et al.  Can homomorphic encryption be practical? , 2011, CCSW '11.

[18]  Li Bai,et al.  A Cloud Computing Medical Image Analysis and Collaboration Platform , 2011, CLOSER 2011.

[19]  Pradeep K. Atrey,et al.  Secure cloud-based medical data visualization , 2012, ACM Multimedia.

[20]  Pradeep Dubey,et al.  Mapping High-Fidelity Volume Rendering for Medical Imaging to CPU, GPU and Many-Core Architectures , 2009, IEEE Transactions on Visualization and Computer Graphics.

[21]  Kristin E. Lauter,et al.  Cryptographic Cloud Storage , 2010, Financial Cryptography Workshops.

[22]  Thomas Friese,et al.  A Cloud-Deployed 3D Medical Imaging System with Dynamically Optimized Scalability and Cloud Costs , 2011, 2011 37th EUROMICRO Conference on Software Engineering and Advanced Applications.

[23]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[24]  Noboru Sonehara,et al.  Privacy by Data Provenance with Digital Watermarking - A Proof-of-Concept Implementation for Medical Services with Electronic Health Records , 2010, 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.